Fri.Nov 08, 2019

Bill Would Create a Federal Digital Privacy Agency

Data Breach Today

Legislation Spells Out Privacy Rights and Enforcement Measures Two Democratic members of the U.S. House have proposed a national privacy law that calls for the formation of a new federal agency to enforce the privacy rights that it defines

Italian police shut down darkweb Berlusconi market and arrested admins

Security Affairs

Italian law enforcement shut down the ‘Berlusconi market’ black market and arrested three suspected of being its administrators.

Following Massive Breach, Capital One Replacing CISO: Report

Data Breach Today

#COBOL60: Your COBOL questions, answered – Part Two

Micro Focus

At a recent Micro Focus-sponsored virtual event, more than 300 COBOL community members celebrated its 60th anniversary and by posing over 90 questions to our expert panel.

IT 77

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Analysis: Using Twitter for Espionage

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks

More Trending

Update: PCI SSC's Enhanced Contactless Payment Standard

Data Breach Today

In December, PCI SSC plans to publish a new standard for solutions that enable "tap and go" transactions on merchant smartphones and other commercial off-the shelf mobile devices.

How Do We Bring Equality to Data Ownership and Usage?

WIRED Threat Level

Computational biologist Laura Boykin says scientists are “asleep at the wheel”; activist Malkia Devich-Cyril says citizens also need to pressure technology companies to change. Security Security / Security News

Health Data Breach Tally Update: Top Causes

Data Breach Today

An Analysis of the Latest Trends - and What's Ahead Hacker attacks, IT mishaps, and vendor errors are among the top causes of the largest health data breaches added to the official federal tally so far this year. Here's an update

xHelper Malware for Android

Schneier on Security

xHelper is not interesting because of its infection mechanism; the user has to side-load an app onto his phone. It's not interesting because of its payload; it seems to do nothing more than show unwanted ads.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Sen. Wyden Pushes FCC on 5G Security

Data Breach Today

Lawmaker Asks for Encryption and Authentication Requirements U.S. Senator Ron Wyden is pushing the Federal Communications Commission to ensure that wireless carriers build new security measures, such as encryption and authentication, into 5G networks as they're rolled out over the next several year

How AI can supercharge the benefits of business intelligence

Information Management Resources

AI is perfectly aligned to the goal of business intelligence, which is to make business more intelligent by augmenting and, in some cases, automating human intelligence. Artificial intelligence Business intelligence Data management

DOJ: Company Sold Gear With Security Flaws to US Military

Data Breach Today

Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S.

Oracle Analytics Cloud and Autonomous Data Warehouse – Better Together

Perficient Data & Analytics

Perficient Presents at Oracle OpenWorld 2019.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Protecting Data in Sprawling Computing Environments

Data Breach Today

Sprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA

Cloud 100

Cloudflare CEO Matthew Prince on the Struggles of Policing the Web

WIRED Threat Level

At WIRED25 the internet infrastructure chief talks about doing the hard calculus of pulling support from controversial sites—and why that’ll happen again. Security Security / Privacy

Bugcrowd Pays Out Over $500K in Bounties in One Week

Dark Reading

In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone


WhatsApp Cofounder Brian Acton on Why Privacy Matters

WIRED Threat Level

The cofounder of the messaging service and the current chair of the Signal Foundation talks about the proliferation of end-to-end encryption in personal communications. Business Business / Computers and Software Security

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Pulse of ITAD: What New Data Protection Laws Mean for e-Scrap Processors


New data protection laws in California and New York are part of a national trend that will fundamentally change the way businesses handle personal information, according to Bob Johnson, CEO of the National Association for Information Destruction (NAID).

IT 52

Cisco Talos discovered multiple flaws in the LEADTOOLS toolkits

Security Affairs

Cisco Talos security researchers discovered multiple flaws in the LEADTOOLS imaging toolkits that could lead to code execution on the target system.

Penetration Testers Arrested in Iowa Causing Controversy

IG Guru

Coalfire, a network penetration testing company, issued a press release regarding the arrest of their employees at an Iowa court house. The employees were authorized by the State of Iowa to perform penetration testing, but were arrested by local authorities after tripping a building alarm.

Risk 52

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation

Security Affairs

Microsoft is warning once again of more BlueKeep attacks that could deliver disruptive payloads and urges organizations to patch their systems.

10 top strategic trends that will drive data management in 2020

Information Management Resources

Research firm Gartner, Inc. has identified the 10 top strategic technology trends that organizations need to explore in 2020. Artificial intelligence Data strategy Blockchain Data security Cloud computing

Capesand is a new Exploit Kit that appeared in the threat landscape

Security Affairs

A recently discovered exploit kit dubbed Capesand is being involved in live attacks despite the fact that it’s still under development. In October 2019, researchers at TrendMicro discovered a new exploit kit dubbed Capesand that is being involved in live attacks.

Federal and State Authorities Increase Scrutiny and Enforcement of Children’s Privacy; Google, YouTube Agree to Pay a Record $170 Million Fine

Data Matters

This fall, scrutiny has increased on children’s privacy with the FTC and New York Attorney General’s announcement of the largest fine ever for violations of the Children’s Online Privacy Protection Act (“COPPA”), followed by FTC public workshops on updating the COPPA Rule. Combined with increased requirements for the sale of teen personal information under the California Consumer Privacy Act (“CCPA”), and calls for triple fines for children’s privacy violations under a potential CCPA 2.0

DNA-testing startup Veritas Genetics disclosed a security breach

Security Affairs

DNA-testing startup Veritas Genetics disclosed a security breach that exposed customer information, but genetic information, health records are not affected.

Platinum APT Shines Up New Titanium Backdoor


The trojan was observed as the final payload in a sophisticated and complex malware installation code set. Malware apt Asia backdoor Kaspersky Malware analysis Platinum titanium Trojan


Pwn2Own Tokyo 2019 -Day2: experts hacked Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers

Security Affairs

Pwn2Own Tokyo 2019 -Day2: Experts earned a total of $120,000 for finding exploits against Samsung Galaxy S10 and Xiaomi Mi9 phones and TP-Link AC1750 routers.

IT 52